

LogPoint and Trellix Helix Connect compete in the SIEM and SOAR solutions category. Trellix Helix Connect appears to have the upper hand due to its strong automation capabilities and integration potential.
Features: LogPoint is known for its robust logging capabilities, flexible search functions, and user-friendly integration. The solution's cost-effectiveness and its dual SIEM and SOAR offering in one solution also highlight its strengths. Trellix Helix Connect stands out with its automation, threat intelligence correlation, and integration capabilities, supporting over 400 connectors. Its quick implementation and AI features further enhance its appeal for sophisticated security operations.
Room for Improvement: LogPoint could benefit from improving its documentation, integrating better with third-party solutions, and enhancing its UI for better user experience and customization. It's also noted that LogPoint needs advanced cloud-native features. Trellix Helix Connect requires improvements in customer service, reducing false positives, and enhancing dashboard features. Pricing and support response times are also areas of concern for Trellix Helix users.
Ease of Deployment and Customer Service: LogPoint is mainly deployed on-premises and faces challenges regarding customer service response times and technical support quality. Limited local support in the US affects user experience. Trellix Helix Connect shows greater deployment flexibility, available in public, private, and hybrid clouds, though users report issues with technical support and customer service delays. However, they find the initial deployment straightforward.
Pricing and ROI: LogPoint offers a fixed pricing model appreciated for its predictability and cost-effectiveness, generally mid-ranged with available discounts. This steady pricing supports ROI by facilitating compliance and security monitoring. Trellix Helix Connect is viewed as costlier, oriented towards larger enterprises, requiring third-party log licensing. Its comprehensive capabilities contribute to its higher perceived cost, yet users recognize ROI benefits in terms of reducing incident response times.
We have seen a return on investment with Trellix Helix Connect, and we can share relevant metrics as we reduce the MTTD and MTTR and have KPIs indicating our ROI.
Logpoint's customer support is not sufficient with only one engineer in the US.
The technical support for Logpoint is very good, and I would rate it as nine out of ten.
I recommend a submission to Logpoint because I worked with it before.
I assess the effectiveness of Trellix Helix Connect's threat detection capabilities as robust, making it more powerful than Trend Micro and other solutions like CrowdStrike.
The customer support for Trellix Helix Connect is well in Latin America because there are many people in the region, which enhances the experience.
We experienced some challenges due to the ongoing transformation and fusion of McAfee and FireEye, but we are committed to improving response times.
It is web-based and accommodates the expansion of our organization.
Logpoint is scalable and capable of expanding.
Trellix Helix Connect's scalability is excellent as the solution has a library to make integrations with other brands.
We support the largest companies in the world and can cater to large environments.
I have received reports indicating glitches and downtimes with Logpoint.
Trellix Helix Connect is very stable, and I have experienced almost no downtime or issues.
The availability is high, which is critical for our customers who rely on a single panel of glass to operate.
Dealing with foreign entities for support was a challenge, leading us to switch providers due to lack of adequate support.
Logpoint's UEBA is a weak point, while Exabeam's UEBA has extra AI through automation.
Logpoint needs to be cloud-native, as currently, it is not.
We have just released the solutions to the market recently, making it a revolution in the cybersecurity sector.
The weak point of Trellix Helix Connect is the data storage capacity; more storage must be purchased as the data grows, which is a disadvantage because the cost increases when more space is needed on the cloud.
The usability of hyperautomation is something to improve in the solution because it is expensive regarding the needed improvements.
I rate the pricing at eight, suggesting it's relatively good or affordable.
It is not the cheapest, but also not the most expensive solution.
The UEBA enables us to monitor at the device level, and SOAR provides playbooks and templates that we can modify and incorporate into the platform.
The most valuable feature, which is endpoint security, is included in Logpoint, and an extra feature is the integration.
It effectively facilitates logging and log storage and assists in security event management by ingesting security events.
Trellix Helix Connect easily integrates with Office 365 and also integrates well with FortiGate, Palo Alto, and Barracuda, especially within AWS environments.
Trellix Helix, as an AI XDR platform, helps our organization by offering an extensive number of connectors for integration, enabling us to consolidate all information in a single dashboard.
The features that I find most valuable in Trellix Helix Connect are the incident response capabilities, which include EDR and XDR, along with the SoC capabilities added in the new advanced Trellix AI intelligence.
| Product | Mindshare (%) |
|---|---|
| Trellix Helix Connect | 1.2% |
| Logpoint | 1.2% |
| Other | 97.6% |


| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 1 |
| Large Enterprise | 7 |
Logpoint offers a robust SIEM system tailored for compliance with regulations like PCI DSS and GDPR, enhancing security monitoring and enabling efficient incident response.
Logpoint strengthens cybersecurity by offering essential tools for log collection, security monitoring, and forensic analysis. Its features include an intuitive dashboard, a powerful correlation engine, and extensive third-party integrations, making it a versatile asset for security operations centers. Despite its advantages, areas for improvement include ransomware protection, cloud-native deployment, and more flexible pricing. Improvements in features like SOAR and UEBA functionality can boost its competitiveness.
What are the most important features of Logpoint?Many organizations utilize Logpoint across industries as part of their security infrastructure. It supports standard compliance, orchestrating incident responses and security threat monitoring. Logpoint empowers businesses by integrating and correlating security data, improving cybersecurity posture in varied environments.
Trellix Helix Connect leverages automation with playbooks and AI, enhancing incident management, data correlation, and reducing response times while easing integration and improving threat visibility.
Trellix Helix Connect transforms cyber operations with automated workflows, cutting response times and decreasing analyst fatigue. Its ability to integrate seamlessly with existing infrastructures improves incident handling through advanced AI and data correlation techniques. Quick to implement, it enhances threat visibility, enabling faster incident triage, alert correlation, and threat intelligence integration. While the platform excels in these areas, users have noted areas for enhancement, such as integration with third-party tools, better dashboard functionalities, and reduced false positives. Despite concerns over licensing costs and connectivity issues, Trellix Helix Connect remains a valuable asset for centralized security event management and response automation.
What are the key features of Trellix Helix Connect?Organizations rely on Trellix Helix Connect for centralized correlation and security event management, integrating it with existing tools for streamlined alert management and enhanced cybersecurity measures. It supports tasks like phishing detection, data protection, and endpoint security, essential in industries facing persistent network threats, including managing logs, detecting malware, and automating responses, reducing investigation times and improving notification efficiency.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.